Blogs | AlienVault
The AlienVault Blogs
Taking On Today’s Threats

Encouraging organizations to follow the usual security best practices didn’t prevent the spread of WannaCry. Let’s acknowledge that and focus on new ideas that will.In the aftermath of the WannaCry ransomware outbreak, a familiar pattern is beginning to play itself out. Now that we all know the general details behind how WannaCry infections were initiated… Read more

Tags: ransomware, wannacry

Posted in Blog: Labs

In recent weeks, there have been some high-profile reports about Mac malware, most notably OSX/Dok and OSX.Proton.B. Dok malware made headlines due to its unique ability to intercept all web traffic, while Proton.B gained fame when attackers replaced legitimate versions of HandBrake with an infected version on the vendor’s download site. Another lower profile… Read more

Tags: malware, mac, proton, dok, systemd

WannaCryWe should start by addressing the elephant in the room. In the past week WannaCry has dominated the news and still looks to be the topic on the tips of everyone’s tongues.There’s probably not much to add without repeating much of what has already been said.A Twitter moment capturing much of the early… Read more

Tags: news

Organizations have been using Google’s G Suite (formerly Google Apps) business productivity and collaboration tools for over a decade. Yet security concerns grow as organizations turn to cloud applications like G Suite to store their business-critical data. Organizations need complete visibility of their data integrity, privacy, and user access activities within G Suite.To help our customers address… Read more

Tags: google, google apps, alienapp, g suite

In the enterprise, it's very popular to manage Windows client PCs through Red Hat servers. This sort of configuration is especially common in healthcare and the financial services industries. Red Hat Enterprise Linux (RHEL) has good software for working with Windows Active Directory. Red Hat Enterprise Linux can also manage clients with multiple platforms, such as Windows, OS X,… Read more

Tags: red hat, active directory, ldap

Get the latest
security news in
your inbox.

Subscribe via Email

Labs Research
Security Essentials
All Blogs

Gartner MQ

Featured Content

Get Price Free Trial Chat